Hi All,
Met a strange behavior from FG-200D 5.4 software, where I created multiple VLAN sub-interfaces on the LAN physcial interface, while setting all to Role: LAN. I created policies to control inter-VLAN traffic, but while testing I noticed that the Inter-VLAN traffic goes un-controlled (no logged traffic detected hitting the policies), however, when I changed the Role to "Undefined", the expected behavior took place. What is this Role setting under the VLAN interface configuration? Is it like assigning the VLAN sub-interface to a "LAN" Zone while allowing intra-zone traffic?
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello,
I'm not sure I have any answers for you, but a few questions to help clarify this:
[ol]
Question: Is this the normal expected behavior, that the Policy Routes overrides the Connected Routes? I was trying to find a reference for this in Fortinet Documentation with no luck
@mohamed.sabbah:
Yes, policy routes are inspected and followed before the routing table is checked. Unfortunately, there is no visual representation of policy routes so this can become tricky at times.
From the FortiOS Handbook for v5.2, pg. 248 "Policy routing" in "Advanced routing":
If no policy route matches the packet, the FortiGate unit routes the packet using the routing table.
I agree with you about the lack of Highlighted presentation of Policy Routes when inspecting/diagnosing routing issues. Once we look at the Routing Table we expect to see a repository of all IP routing information in that table, and it does not click that policy routes might play a role in changing the Routing Table behavior. It would be great at least to have in the cli list of policy routes on top of the routing table once we "get router info routing-table all" to remind us about the higher priority of those policy routes superseding the routing table. Maybe to preserve the info "routing-table" technical meaning, they could have introduced a new parameter to the command "prouting-table" standing for Policy and Routing-Table information. Or maybe adding a switch to the command to allow including policy-routes ahead of the other routes: get router info routing-table addpolicy all.
I totally agree.
There is one more caveat with Policy routes: if the configured interface is down, the policy route is not removed like with a regular route. Traffic will be sent into Nirvana in this case. Accordingly, there is no DPD/ping server for policy routes.
I wonder if this is ever going to change, and have been for the past 10 years.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1679 | |
1085 | |
752 | |
446 | |
226 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.